Operations | Monitoring | ITSM | DevOps | Cloud

Linux

What is the Cyber Resilience Act (CRA)? | Open Source Cybersecurity

Today, compliance is more important than ever before. As part of our #CybersecurityAwareness month series, we’re sharing essential insights on security compliance. Watch as Cédric Gégout, VP of Product Management at Canonical, breaks down the key aspects of the Cybersecurity Resilience Act (CRA), a new regulation set to take effect in 2027. In the video, you’ll learn what CRA is, how it classifies products, and what it means for your organization.

Secure your stack with Canonical | Open Source Cybersecurity

Cybersecurity is an ongoing challenge for many enterprises, and safeguarding systems against evolving threats requires proactive, diligent security assessments and monitoring. Security and compliance is a challenge for organizations, with research showing that 84% of codebase contains at least one vulnerability and requires about 100 days on average to apply those fixes. In this video, Cédric Gégout, VP Product Management at Canonical, dives into the complexities of securing open source systems and company infrastructures, sharing insights from Canonical’s 20+ years of experience.

What is a vector database?

A vector database is a data storage system that organises information in the form of vectors, which are mathematical representations. These databases are designed to store, index, and query vector embeddings or numerical representations of unstructured data, including text documents, multimedia content, audio, geospatial coordinates, tables, and graphs.

15 Essential Kali Linux Commands Ethical Hackers Need to Know

As ethical hacking continues to grow in importance, professionals require a reliable operating system to assist them in their tasks. A Debian-based distribution, Kali Linux is the go-to OS for ethical hackers and penetration testers. But why has it become the industry standard? This post will explore what makes Kali Linux essential and dive into the key commands every ethical hacker should know.

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Ubuntu powers Azure's confidential AI offering

Microsoft Azure has announced the general availability of their confidential virtual machines (VMs) with NVIDIA H100 Tensor Core GPUs, powered by Ubuntu. This offering combines the hardware-based protection of AMD EPYC processors with NVIDIA’s latest GPU technology to enable secure and high-performance AI workloads in the cloud. Combining these technologies allows sensitive sectors to unlock AI adoption through addressing previous concerns of critical data privacy.

The waiting game is over. 5G is coming to the edge.

Cédric Gégout (VP of Product at Canonical) reflects on a recent research report that Canonical published in collaboration with Omdia. The report uncovered that despite the lack of widespread 5G standalone infrastructure, enterprises, industrial actors and service providers are preparing for 5G edge computing to produce returns within two years.

How to deploy AI workloads at the edge using open source solutions

AI is driving a new wave of opportunities in all kinds of edge settings—from predictive maintenance in manufacturing, to virtual assistants in healthcare, to telco router optimisation in the most remote locations. But to support these AI workloads running virtually everywhere, companies need edge infrastructure that’s fast, secure and highly scalable.

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).